Privacy Preserving Moving KNN Queries
نویسندگان
چکیده
We present a novel approach that protects trajectory privacy of users who access locationbased services through a moving k nearest neighbor (MkNN) query. An MkNN query continuously returns the k nearest data objects for a moving user (query point). Simply updating a user’s imprecise location such as a region instead of the exact position to a locationbased service provider (LSP) cannot ensure privacy of the user for an MkNN query: continuous disclosure of regions enables the LSP to follow a user’s trajectory. We identify the problem of trajectory privacy that arises from the overlap of consecutive regions while requesting an MkNN query and provide the first solution to this problem. Our approach allows a user to specify the confidence level that represents a bound of how much more the user may need to travel than the actual kth nearest data object. By hiding a user’s required confidence level and the required number of nearest data objects from an LSP, we develop a technique to prevent the LSP from tracking the user’s trajectory for MkNN queries. We propose an efficient algorithm for the LSP to find k nearest data objects for a region with a user’s specified confidence level, which is an essential component to evaluate an MkNN query in a privacy preserving manner; this algorithm is at least two times faster than the state-of-the-art algorithm. Extensive experimental studies validate the effectiveness of our trajectory privacy protection technique and the efficiency of our algorithm.
منابع مشابه
Location Based Authentication of KNN Queries with Location and Query Privacy
In mobile communication, spatial queries pose a serious threat to user location privacy because the location of a query may reveal sensitive information about the mobile user. In this paper, study approximate k nearest neighbor (kNN) queries where the mobile user queries the location-based service (LBS) provider about approximate k nearest points of interest (POIs) on the basis of his current l...
متن کاملMining Multiple Private Databases using a Privacy Preserving kNN Classifier
Data mining technologies are popular for identifying interesting patterns and trends in large amounts of data. With the advent of high speed networks and easily available storage, many organizations are able to collect large amounts of data. On one hand, these organizations would like to mine their data to understand and discover interesting patterns; on the other hand, many legal and commercia...
متن کاملMining Multiple Private Databases using a Privacy Preserving kNN Classifier
Data mining technologies are popular for identifying interesting patterns and trends in large amounts of data. With the advent of high speed networks and easily available storage, many organizations are able to collect large amounts of data. On one hand, these organizations would like to mine their data to understand and discover interesting patterns; on the other hand, many legal and commercia...
متن کاملConstructing an Effective and Secure Query Services with Rsap Data Perturbation in the Cloud
Now a day’s cloud is more popular because in cloud users host the data and upload a large contained data. It has large databases to database service providers so database service providers maintain the services of range query services. In clouding process some users have a sensitive private data in that situation user’s can’t move the data for hosting until we provide security, confidentiality,...
متن کاملConfidential and Efficient Query Services in the Cloud Using K-NN with R-Tree and Rasp Data Perturbation
With the development of services computing and cloud computing, it has become possible to outsource large databases to database service providers and let the providers maintain the rangequery service. However, some data might be sensitive that the data owner does not want to move to the cloud unless the data confidentiality and query privacy are guaranteed. We propose the Random Space Encryptio...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- CoRR
دوره abs/1104.2756 شماره
صفحات -
تاریخ انتشار 2011